General
-
Target
6062c6a1a0e2b72517b9ac376ea86cf2dfc1a17bd496acb78013af1666df8379.exe
-
Size
610KB
-
Sample
241119-atbbpaxqft
-
MD5
3f8e22ff53a053acb5b236f8264e4ab1
-
SHA1
503d9b7e8444290630ddc73f72ab7198f2648f72
-
SHA256
6062c6a1a0e2b72517b9ac376ea86cf2dfc1a17bd496acb78013af1666df8379
-
SHA512
34d48aec79c939ef39ab81c02062ee7bdc3029dd1fb4b6e6b980a15a0745827f57585ce3783703682bd3bbbea8441121d3b72b4e83fd66ecafa64eeaf87e8c6f
-
SSDEEP
12288:Py90slz1fACEBre8hMqPOGMv5Fsh+TrG6iwDi3Vbk3K9ZDKOCoNy:PyLxforXmZXsx6ix3R6K9Z1Ny
Static task
static1
Behavioral task
behavioral1
Sample
6062c6a1a0e2b72517b9ac376ea86cf2dfc1a17bd496acb78013af1666df8379.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
6062c6a1a0e2b72517b9ac376ea86cf2dfc1a17bd496acb78013af1666df8379.exe
-
Size
610KB
-
MD5
3f8e22ff53a053acb5b236f8264e4ab1
-
SHA1
503d9b7e8444290630ddc73f72ab7198f2648f72
-
SHA256
6062c6a1a0e2b72517b9ac376ea86cf2dfc1a17bd496acb78013af1666df8379
-
SHA512
34d48aec79c939ef39ab81c02062ee7bdc3029dd1fb4b6e6b980a15a0745827f57585ce3783703682bd3bbbea8441121d3b72b4e83fd66ecafa64eeaf87e8c6f
-
SSDEEP
12288:Py90slz1fACEBre8hMqPOGMv5Fsh+TrG6iwDi3Vbk3K9ZDKOCoNy:PyLxforXmZXsx6ix3R6K9Z1Ny
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1